Static task
static1
Behavioral task
behavioral1
Sample
ed3d7267822f750da10fd8f8d416ab98_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ed3d7267822f750da10fd8f8d416ab98_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed3d7267822f750da10fd8f8d416ab98_JaffaCakes118
-
Size
825KB
-
MD5
ed3d7267822f750da10fd8f8d416ab98
-
SHA1
7685ed60d7a775a55cfd3b6b1c79f411cea756ee
-
SHA256
1a23498499fce9a33a8e09cde5e6162d9b1bc067ca4839ec4ea674c8eaf2d9e9
-
SHA512
38ae9398fb620d586bc9c554e0546162c74ea1bc73e246d670e25da2fa23fe5e9a0bd6094fe831df27ef74660c991aaf01c48d63f40ab8baa9d73f3060f683fa
-
SSDEEP
12288:s2IzwRU8+yyr2N3ivnYkWCEY2Sw7yOKP7iKkV89aJmcsFhsgCyYW+6wXNzs:DIzwU85yOCndj8SwD89aJmFh1aQw94
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed3d7267822f750da10fd8f8d416ab98_JaffaCakes118
Files
-
ed3d7267822f750da10fd8f8d416ab98_JaffaCakes118.exe windows:5 windows x86 arch:x86
35c4488304e5b4a6b74cf4d6de90c40f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SwitchToFiber
SetVolumeMountPointA
FormatMessageA
AddAtomA
LoadLibraryA
QueryDosDeviceA
ReplaceFileA
AddVectoredExceptionHandler
InvalidateConsoleDIBits
LeaveCriticalSection
GetCompressedFileSizeA
_hread
CreateDirectoryExA
OpenJobObjectA
GetCommTimeouts
GetSystemTimeAsFileTime
DeleteCriticalSection
SetConsoleInputExeNameW
PeekNamedPipe
FindResourceW
GetLargestConsoleWindowSize
InitializeSListHead
VirtualAlloc
CloseProfileUserMapping
SetSystemTimeAdjustment
ReadFile
GlobalFree
EnterCriticalSection
RegisterWaitForSingleObjectEx
ExpungeConsoleCommandHistoryA
WideCharToMultiByte
ExitProcess
DosPathToSessionPathW
GetStartupInfoA
BaseFlushAppcompatCache
WaitCommEvent
pdh
PdhOpenQueryH
PdhCloseLog
PdhGetFormattedCounterValue
PdhTranslate009CounterW
PdhEnumMachinesHW
PdhVerifySQLDBW
PdhVbUpdateLog
PdhValidatePathW
PdhParseCounterPathA
PdhExpandWildCardPathA
PdhGetFormattedCounterArrayA
PdhGetDefaultPerfCounterW
PdhEnumObjectsA
PdhCreateSQLTablesW
PdhCreateSQLTablesA
PdhParseInstanceNameW
PdhUpdateLogFileCatalog
PdhAdd009CounterW
PdhEnumMachinesW
PdhGetDataSourceTimeRangeW
PdhVbIsGoodStatus
PdhTranslateLocaleCounterA
PdhGetRawCounterArrayW
PdhGetDefaultPerfObjectHA
PdhOpenLogW
PdhGetLogFileTypeA
PdhEnumObjectsHW
PdhRelogW
PdhVbCreateCounterPathList
PdhGetDllVersion
PdhEnumObjectItemsA
PdhGetLogFileTypeW
PdhGetCounterTimeBase
PdhEnumMachinesA
PdhEnumMachinesHA
PdhRelogA
PdhVerifySQLDBA
PdhParseCounterPathW
PdhSetQueryTimeRange
PdhGetDataSourceTimeRangeH
PdhListLogFileHeaderW
PdhGetDefaultPerfObjectA
PdhGetRawCounterArrayA
PdhGetCounterInfoA
PdhGetDefaultPerfObjectHW
sqlunirl
_RegisterServiceCtrlHandler_@8
_StartService_@12
_CreateStatusWindow_@16
_CreateDirectory_@8
_GetOpenFileName@4
_CommDlg_OpenSave_GetFilePath@12
_ObjectCloseAuditAlarm_@12
_MapVirtualKeyEx_@12
_LoadCursorFromFile_@4
_GetTextExtentPoint@16
_lstrcmpi_@8
_DlgDirListComboBox_@20
_FindWindow_@8
_EnumResourceNames_@16
_GetKeyboardLayoutName_@4
_GetTimeFormat_@24
_CreateScalableFontResource_@16
_IsCharLower_@4
_GetTextExtentExPoint_@28
_GetDiskFreeSpaceEx_@16
_NDdeIsValidShareName_@4
_IsDialogMessage@8
_GetFileVersionInfo_@16
_EndUpdateResource_@8
_OpenWindowStation_@12
_OpenFile_@12
wintrust
TrustFreeDecode
WVTAsn1SpcLinkEncode
CryptCATAdminCalcHashFromFileHandle
WintrustAddDefaultForUsage
WVTAsn1CatMemberInfoEncode
CryptSIPPutSignedDataMsg
OfficeInitializePolicy
CryptCATCDFEnumMembersByCDFTag
CryptCATAdminAddCatalog
CryptCATAdminResolveCatalogPath
DriverInitializePolicy
CryptCATPutCatAttrInfo
WVTAsn1CatNameValueEncode
SoftpubDefCertInit
WTHelperGetFileHandle
WVTAsn1SpcIndirectDataContentDecode
SoftpubInitialize
mscat32DllRegisterServer
WVTAsn1SpcSpAgencyInfoDecode
CryptSIPGetInfo
SoftpubCleanup
WVTAsn1SpcSpAgencyInfoEncode
CryptCATPutMemberInfo
WTHelperGetAgencyInfo
CryptCATAdminRemoveCatalog
WVTAsn1CatMemberInfoDecode
TrustFindIssuerCertificate
CryptCATAdminReleaseCatalogContext
WintrustRemoveActionID
crtdll
_mbsnbcmp
log10
wcspbrk
_fputwchar
_ismbclower
pow
_ismbckata
_winver_dll
atof
_ismbcdigit
__toascii
_pwctype_dll
ftell
printf
_j0
_strerror
_chdir
_stat
_lrotl
fwscanf
_mbsnbicmp
_heapchk
_getdllprocaddr
iscntrl
wcscat
_ctype
_findfirst
_strupr
wcstok
wcstod
_wcsnicmp
_CIpow
fputc
_tolower
_strspnp
_sopen
_stricmp
_fputchar
is_wctype
_splitpath
_clearfp
_CIcos
msvcrt
_getsystime
__p__commode
_putws
_access
_chdrive
exit
?_query_new_mode@@YAHXZ
_getcwd
_chmod
__p__timezone
__set_app_type
_chsize
_mbsnextc
malloc
??0exception@@QAE@XZ
??0bad_typeid@@QAE@ABV0@@Z
iswgraph
__p__osver
_vsnprintf
_CIsinh
_execvp
_cputs
__wargv
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
_cgetws
??_Fbad_cast@@QAEXXZ
ldiv
wcschr
__p__pwctype
_fdopen
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 522KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ